Truly realize “prevention and control in advance” with endogenous security
VE4017P0 From the concept of the industrial Internet to the stage of deep cultivation, what trends will the future security precautions show? What are the potential new technologies that can be integrated into the security link?
“In the new situation and new environment, traditional protection means have failed, it is necessary to use endogenous security to ensure the security of industrial information systems, to achieve the integration of network security capabilities and industrial information environment, so as to truly establish an endogenous security security system.” Wu Yunkun believes that the core of industrial information system security protection, including the industrial Internet, is to achieve systematic security protection, and security should be moved from “scattered construction” to “global construction”.
According to relevant experts, the creation of an endogenous security framework VE4017P0 aims to promote the planning, construction and operation of the security system in different industrial scenarios, and meet the information security needs of digital transformation and intelligent upgrading.
The so-called endogenous security, simply put, is the systematic analysis, deconstruction and understanding of the industrial system, the establishment of a comprehensive network security capability system, and the ability to “invoke” the industrial production system, integration and coverage, in order to enhance the security protection capability of the original industrial system.
In addition, Wu Yunkun also suggested that protecting industrial Internet security requires a large number of security talents, especially those who understand both business and security, production and big data, artificial intelligence and other technologies.
VE4017P0 Du Lin believes that to enhance the security protection capability of the industrial Internet, new technologies can become a key starting point: On the one hand, new technologies such as artificial intelligence, edge computing technology, 5G technology and industrial big data technology can be integrated with security technology to form distributed trusted authentication technology based on blockchain, isolation technology based on edge computing, intrusion detection technology and situation analysis technology based on artificial intelligence. On the other hand, it is necessary to vigorously promote the research of key core technologies, so that some new network security technologies, such as mimicry defense technology and quantum communication technology, can be applied to the security protection of the industrial Internet as soon as possible.
For the industrial Internet to create endogenous security capabilities, Du Lin VE4017P0 suggested that network security enterprises should be encouraged to join forces with system equipment providers and industrial head enterprises to carry out collaborative innovation, create equipment products with embedded security functions, and achieve the aggregation of industrial production systems and security systems. In addition, in the process of planning, construction and operation and maintenance of the industrial Internet system, the construction of security capabilities can be considered simultaneously, and combined with threat intelligence, through continuous detection, analysis, response, and combat advanced threats, to help the industrial Internet improve active defense capabilities.